RSS feed Get our RSS feed

News by Topic

ip technology

Results 376 - 400 of 401Sort Results By: Published Date | Title | Company Name
By: TeamQuest     Published Date: Sep 06, 2012
Verizon Wireless executive Rich Rodgers explains how his team knew they had the right amount of capacity to handle the surge in IT service demand during the iPhone launch.
Tags : iphone, verizon wireless, capacity management, performance management, information technology, capacity planning
     TeamQuest
By: APTX     Published Date: Nov 05, 2009
Viable distribution of Multi-channel Audio-over-IP for Live and Interactive "Voice Talent" based Gaming using High-quality, Low-latency Audio Codec technology.
Tags : aptx, audio-over-ip, voice talent, interactive gaming, audio codec, compression, ip network, bandwidth
     APTX
By: Polycom     Published Date: Dec 18, 2014
In the next few years we shall see explosive growth in the use of video conferencing as a fundamental tool for businesses to enhance communication and collaboration between employees, partners and customers. The technology has developed considerably from early adopters to its current form of mass market roll-out. It’s anticipated that nearly half of information workers will have some type of personal video solution in 2016, up from just 15% today. With video conferencing becoming a core component of IT infrastructure that enables communication and collaboration, businesses will be looking to providers of telephony, business applications and network infrastructure services to include this capability as part of their offering. This report will examine the basic components of the technology, considerations for deploying video conferencing solutions, and will introduce the Polycom® RealPresence® Platform to readers
Tags : business, video, conference, multicultural, meetings, communication, cio, digital
     Polycom
By: Cisco     Published Date: Jan 05, 2015
In Forrester’s 24-criteria evaluation of videoconferencing infrastructure and cloud services vendors, we identified the 10 most significant OEMs — Acano, AGT, Avaya, Blue Jeans Network, Cisco Systems, Lifesize, Pexip, Polycom, Videxio, and Vidyo — in the category and researched, analyzed, and scored them. This report details our findings about how well each vendor fulfills our criteria and where they stand in relation to each other to help technology managers select the right videoconferencing infrastructure or service for their environment.
Tags : 
     Cisco
By: BLADE Network Technologies     Published Date: Nov 18, 2008
This document describes enterprise virtualization today and the anticipated uses of this technology, particularly leveraging the capabilities provided by widespread adoption of 10 Gigabit Ethernet (10GbE) as a single, converged network fabric.
Tags : blade network technologies, next-generation datacenter networks, virtualization today, 10gbe, network virtualization
     BLADE Network Technologies
By: Adobe     Published Date: Aug 09, 2017
Detailed craftsmanship. Unexpected angles. Authentic stories. See what’s trending in the world of images in our Visual Trends: Volume 1 report. You’ll learn all about: • How artists are using digital technology in fine art • The increased use of drones in aerial photography • Female stereotypes being challenged on both sides of the camera
Tags : 
     Adobe
By: Ipswitch     Published Date: Mar 14, 2014
Due to the massive volume and complexity of the information – compounded by the use of cumbersome DOS scripts – Viva Health needed to simplify and automate their file transfer processes while also remaining in compliance of various regulations. See how they accomplished both objectives with MOVEit Central.
Tags : ipswitch, moveit, information management, automation, file transfer, file transfer process, regulatory compliance, file transfer system
     Ipswitch
By: mindSHIFT     Published Date: Nov 29, 2007
Will Voice over IP technology provide business-class security and reliability you expect in your phone system?
Tags : voip, voice over ip, vonage, communication, phone, phone system, long distance provider, phone service provider
     mindSHIFT
By: HP     Published Date: Sep 02, 2015
Service virtualization enables development and test teams to simulate and model the dependencies of unavailable or limited services and data. Voke conducted a survey of 505 participants from technology and non-technology companies to explore their use of service virtualization and its results. Organizations using service virtualization experienced fewer defects, reduced software cycles, and increased customer satisfaction. The 2015 Service Virtualization Market Snapshot™ REPORT by Voke Research provides real-world data to help you justify the investment in service virtualization.
Tags : analytics software, application management, application performance, cloud applications, cloud virtualization, service virtualization
     HP
By: Juniper Networks     Published Date: Aug 08, 2017
Juniper Networks Webinars New Technology Ideas for Innovative Minds.
Tags : 
     Juniper Networks
By: Oracle     Published Date: Jan 07, 2014
38 minute webcast discussing the rise of the empowered consumer and how consumers have changed the B2C relationship forever.
Tags : customer experience, customer insight, cmo and cio relationship, marketing and technology collaboration, cmo and cio collaboration, socially enabled enterprise, social business, social listening
     Oracle
By: BMC Software     Published Date: Jan 31, 2014
“Exploring Business and IT Friction: Myths and Realities,” outlines key issues that cause friction between business users and IT, such as: • Gaps in customer satisfaction and the perceived value of services • Inadequate IT support, which decreases productivity and revenue • Lack of communication and ownership in how business users and IT work together to identify service levels and technology needs See what 900 business and IT professionals had to say and get recommendations for change.
Tags : bmc, cosumerized technology, cloud technology, mobile technology, social technology, customer-first, modernized work processes, social-enabled enterprise applications
     BMC Software
By: BMC Software     Published Date: Aug 18, 2014
"“Exploring Business and IT Friction: Myths and Realities,” outlines key issues that cause friction between business users and IT, such as: • Gaps in customer satisfaction and the perceived value of services • Inadequate IT support, which decreases productivity and revenue • Lack of communication and ownership in how business users and IT work together to identify service levels and technology needs See what 900 business and IT professionals had to say and get recommendations for change. strategy."
Tags : customer satisfaction, it support, communication, business users
     BMC Software
By: Black Box     Published Date: Nov 24, 2015
Black Box can help you get the most out of your technology investment. We partner with customers to identify the right solutions for strategic IT needs that add value to your business. Our portfolios of Wired/Wireless, UCC, and IT Service solutions, and our depth of expertise, deliver positive business outcomes for evolving IT business scenarios. Black Box takes a vendor-independent approach to deliver the right solution, on the right network. Our long-term, established relationships with best-in-class IT technology providers allow us to offer objective, vendor-neutral solutions designed to meet a broad range of IT requirements. With more than 4,000 team members & 200 offices in 150 countries, we offer global capabilities with local expertise, and are committed to driving business success through IT excellence. Our passion to IT communications is unsurpassed, and we will work with you to find the ideal solution for today’s challenge while helping to anticipate tomorrow’s needs.
Tags : voip solutions, contact center solutions, business phone systems, ucc, it services, it solutions, it security, it infrastructure
     Black Box
By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Encryption will help to protect data against unauthorized access by outsiders from lost or stolen devices such as laptops, thumb drives, and other removable media. But it does not protect against the insider threat-employees and contractors with authorized access to data who mistakenly or maliciously leak your most valuable assets.
Tags : trend micro, encryption, laptop, ediscovery, e-discovery, data protection, threats, leaks
     Trend Micro, Inc.
By: LogMeIn     Published Date: Jun 23, 2015
This report will help companies understand the relationship between support interactions, channels, and improving loyalty by investing in the right technology and resources to keep up with customers’ ever-changing behavior and preferences.
Tags : improving loyalty, customer loyalty, customer care, contact center, multi-device, customer relationships, technology, customer experience/engagement
     LogMeIn
By: LogMeIn     Published Date: Jun 23, 2015
This infographic provides a glimpse of the global insights gathered in Ovum's research report and highlights the current state of customer service, customers' preferences and where companies are falling short.
Tags : improving loyalty, customer loyalty, customer care, contact center, multi-device, customer relationships, technology, customer experience/engagement
     LogMeIn
By: Zebra Technologies     Published Date: Jun 15, 2017
Hospitals and other healthcare organizations must contend with a daunting set of challenges when deploying mobile technology. That’s why it’s important to develop a carefully planned mobility strategy. To be successful, your strategy will need strong senior level leadership, commitment, funding and resources. An interdisciplinary team should be gathered— including nursing, physicians, pharmacy, IT, ancillary care, biomedical engineering and finance—to develop a vision for a common technology infrastructure that supports all staff across the organization. This white paper highlights a five-step roadmap for building an effective mobility strategy.
Tags : five-step, roadmap, mobility, strategy, hospital
     Zebra Technologies
By: Adobe     Published Date: Apr 03, 2015
Read our report, Why Marketing Should be Personal, created in partnership with Econsultancy, to learn why 700 marketers ranked personalization as the number-one strategy for marketing success — and find out how you can seize new personalization opportunities for your business, too. Download the report now to discover all the findings, including: • 65% of companies use customer data to personalize the web experience • Personalization drives a 14% average uplift in sales • Integrated marketing technology enables personalization at scale
Tags : personalization, marketing, web experience, sales, marketing technology, adobe, website development, emerging marketing
     Adobe
By: Webroot Inc     Published Date: Jan 15, 2015
The problem with the vast majority of network and endpoint security solutions is that they operate on the premise of static whitelists and blacklists. These lists do not account for the changing nature of URLs, IPs, files and applications, nor for the volume of unknown threats permeating the web, meaning they cannot be used to provide adequate protection. Compounding this problem is that commercial network security technology, such as NGFWs and unified threat management systems, can easily flood the organization’s network security teams with too many alerts and false positives, making it impossible to understand and respond to new threats. As a result, not only do these threats evade the security technology and land with the victim’s infrastructure, but they also have plenty of time to steal sensitive data and inflict damage to the victim’s business. The final characteristic of the latest attacks is how quickly they compromise and exfiltrate data from the organization, compared to the
Tags : firewall, network security, urls, ips, adequate protection, security
     Webroot Inc
By: Juniper Networks     Published Date: Aug 08, 2017
Business is changing fast. Even companies that believe they have a competitive edge today are at risk of falling behind. Information Technology (IT) keeps businesses booming, but it’s a stretch for busy executives to drop into the data center to ensure that server racks and network boxes are humming. Leadership is preoccupied with growing the customer base, keeping costs down, profitability and growth. At a time when disruptive products and services are the name of the game, it’s become clear that doing “enough” with your technology investment simply isn’t enough to survive.
Tags : 
     Juniper Networks
By: StoryDesk     Published Date: Jan 04, 2013
What makes for a winning iPad presentation app for sales teams? How can interactivity keep prospects' attention focused? How can you use technology to make your message more memorable? Learn the answers to these questions and more.
Tags : advertising agencies
     StoryDesk
By: Iron Mountain     Published Date: Apr 13, 2018
Watch this webinar replay featuring 451 Research’s Principal Analyst, Carl Lehmann, and Iron Mountain’s Technology Director, Don Davis, as they discuss a range of Cloud and Data Center topics.
Tags : iron mountain, data center, data center management, cloud computing, workload management
     Iron Mountain
By: Allscripts     Published Date: May 01, 2014
Meaningful Use Stage 2 increases many of the thresholds that were in Stage 1, but the main focus of Stage 2 is on exchanging structured information among providers and patients. With less than 7% of EHR vendors certified, are your systems and providers ready?
Tags : allscripts, ehr certification, portal challenges, cpoe adoption, direct messaging, technology upgrade, replacements, cloud reporting
     Allscripts
By: MuleSoft     Published Date: Nov 27, 2018
Today, government IT teams are expected to deliver more services with fewer resources. Consequently, many agencies have prioritized legacy modernization, interoperability and shared service models as a means towards increasing IT delivery capacity. But those approaches are easier talked about than executed. As agencies embark on legacy modernization, it becomes imperative to open up the existing technology so that new innovations can be delivered as needed in a secure way. In this guide, produced in partnership with Govloop, we will discuss A five-play roadmap to help those in government get a better sense of where to start on modernization projects. An overview of the Information Technology Modernization Fund (ITMF). Featured government success stories highlighting their modernization projects. The IT Modernization Lifecycle, based on the recent report by the American Council for Technology-Industry Advisory Council.
Tags : 
     MuleSoft
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics